Reverse Engineering PopUnder Trick for Chrome

  Рет қаралды 86,363

LiveOverflow

LiveOverflow

Күн бұрын

Пікірлер: 143
@LStranck
@LStranck 7 жыл бұрын
You really hate the man who created that library
@thefunnysmoke1526
@thefunnysmoke1526 4 жыл бұрын
😂😂😂
@wojciechwilimowski985
@wojciechwilimowski985 3 жыл бұрын
Mutually
@ezequielgarrido3987
@ezequielgarrido3987 7 жыл бұрын
Listen man, your content is completely astounding, I've never been more excited over a video about ads. Keep it up!
@daviidon
@daviidon 7 жыл бұрын
I don't know if the guy selling the script is mad or amazed...
@LiEnby
@LiEnby 5 жыл бұрын
singlehandedly destroying his business xD
@Rhidayah
@Rhidayah 4 жыл бұрын
Plot twist: He is guy who selling the popunder
@biehdc
@biehdc 7 жыл бұрын
that guy who sells this stuff starts getting even more mad now :D
@Amilakasun1
@Amilakasun1 6 жыл бұрын
He'll soon device a plan to take over all of internet because of this.
@RiktigMusik
@RiktigMusik 6 жыл бұрын
I SWEAR I was just about to comment exactly the same thing then I saw your comment :D he must hate him 😂
@PyPylia
@PyPylia 4 жыл бұрын
It's 2020 and they still don't have a working popunder. We've won (for now).
@madpivots
@madpivots 4 жыл бұрын
@@PyPylia Just checked his website, he has a "working" one (not a real popunder) but rather it opens a new tab without you noticing
@sanchayanghosh1240
@sanchayanghosh1240 4 жыл бұрын
@@madpivots from what I see the focus does go to the new tab in latest chrome. His popunder script is just misleading at this point.
@peterjohnson9438
@peterjohnson9438 6 жыл бұрын
I'm in awe at both the tenacity and (perhaps) ingenuity of the popunder maker, but also of your ability to document your train of thought. Shame I can't subscribe more than once :D
@user-cz9ss4yq4x
@user-cz9ss4yq4x 7 жыл бұрын
Thank you so much for this. Not only are you providing quality content but you are making the Internet more secure and usable. I always feel like it's a privilege to the sites that they can use JS on *my systems*. So they should obey my rules, not the other way round. Browser exploits should be illegal, I clearly disallowed pop-ups/unders and these sites still hack my system with commercial intent.
@user-cz9ss4yq4x
@user-cz9ss4yq4x 7 жыл бұрын
Created German subtitles, please confirm @LiveOverflow :)
@tommyeldiablo
@tommyeldiablo 6 жыл бұрын
I absolutely love your videos , I must say I understand only 40-50% of what you say , but that gives me motivation to read about stuff that I have never heard before . Keep up the good work man :)
@HACKINGWITHLINUX
@HACKINGWITHLINUX 6 жыл бұрын
this popunder guy is just on next level
@omaryahia
@omaryahia 4 ай бұрын
we can't "under"estimate him 😁
@123-e3h1y
@123-e3h1y 7 жыл бұрын
I think we all agree JavaScript shouldn't run through PDF documents. Seems like a gaping attack vector.
@shary0
@shary0 7 жыл бұрын
It is. Most of malicious PDF files use JS. JS in PDF is enough of a problem to be the subject of multiple internships (including mine :D).
@Daniel15au
@Daniel15au 7 жыл бұрын
How is JS in PDF different to JS in HTML though? Assuming both are sandboxed.
@robslaney3729
@robslaney3729 7 жыл бұрын
Is it possible to restrict the use of base64 encoded PDFs ? Thinking of creating a extension that kills all these tags
@Daniel15au
@Daniel15au 7 жыл бұрын
If Base64 encoded PDFs were restricted, they'd just stop using Base64 encoding.
@comradepeter87
@comradepeter87 5 жыл бұрын
JS in PDFs allow access to local files I think. That could be very dangerous.
@billdimz
@billdimz 6 жыл бұрын
I don't understand 10% of this, but I am *AMAZED* with your programming skills.
@TTTrouble
@TTTrouble 2 жыл бұрын
If anyone sees this, the functionality of the extension he is talking about can be accomplished with the chrome extension “Resource Override” which lets you replace a websites JavaScript with local written scripts, inject it into the head or body and modify request/response headers as well. I went through a whole reverse engineering/scraping exercise and was able to troubleshoot a great deal with this functionality. I could copy the original pages JavaScript into a new JS file, replace it at the HTTP request level with and iteratively edit my copied JS file to investigate what the obfuscated functions did as well as which were necessary and which were trying to prevent reverse engineering and comment those out. Just thought I’d mention it in case someone stumbles across on this the way I did. Stay safe all!
@fission1110
@fission1110 7 жыл бұрын
I had the exact same idea, and have been working on the browser logging/strace/ltrace thing ever since your last video! I've run into tons of problems but have a halfway working prototype. I'll throw it up on github when I get something semi functional.
@fission1110
@fission1110 7 жыл бұрын
I've debated hooking into the profiler in c++ and releasing a malware analysis oriented fork of chromium. Javascript has so many quarky features and edge cases that it's difficult to handle everything with Proxy objects. Mostly been having trouble with Symbols and illegal invocation exceptions, and "read only" variables.
@LiveOverflow
@LiveOverflow 7 жыл бұрын
Try to find solutions that don't require to fork the browser, or put a lot of time into a design that allows easy patching of new versions. DOMinator tried to do that with firefox to log DOM events and analyse them for DOM XSS, and afaik the project kinda withered away because maintaining something like this is a damn lot of work. What is your current approach? I would be interested to chat about this and hear your progress. Can you write me twitter DM or google hangouts or so?
@fission1110
@fission1110 7 жыл бұрын
Messaged you on hangouts
@unutilized
@unutilized 3 жыл бұрын
ok, the mouseup timing idea is amazing.
@trieulieuf9
@trieulieuf9 3 жыл бұрын
Agreed, that is an amazing idea.
@T3sl4
@T3sl4 6 жыл бұрын
"How To Open A Window In 0.5 'A' Presses" :D
@liveportalfeedenglishchane5928
@liveportalfeedenglishchane5928 6 жыл бұрын
An "A" press is an "A" press, you can't say it's a half.
@4pxris3
@4pxris3 6 жыл бұрын
thats the joke...
@liveportalfeedenglishchane5928
@liveportalfeedenglishchane5928 6 жыл бұрын
You saying this about my comment?
@liveportalfeedenglishchane5928
@liveportalfeedenglishchane5928 6 жыл бұрын
@@fasdus Wait, Now I am confused, Am I being wooshed because of "An "A" press is an "A" press you can't say its a half" or the "you saying this about my comment" comment, because if it is the former... I have some bad news - 'tis a reference to a video by pannenkoek2012 (Watch for rolling rocks in 0.5 A presses fairly near the start) If it is the latter, then go get your karma :D.
@NtQueryInformationProcess
@NtQueryInformationProcess 5 жыл бұрын
@@4pxris3 r/woooosh
@MahNameIsJeff
@MahNameIsJeff 7 жыл бұрын
I bet the only dislike from this video is by the guy that sells the popunder services LMAO
@funnyyylock
@funnyyylock 5 жыл бұрын
David Saez some how 13 “humans” dislike this
@laurinneff4304
@laurinneff4304 4 жыл бұрын
funnyyylock The library seller probably created 13 accounts
@XArthieX
@XArthieX 7 жыл бұрын
Damm those are some very clever tricks!
@GigaBoost
@GigaBoost 6 жыл бұрын
The guy making these scripts must be so pissed
@Coolfolder
@Coolfolder 6 жыл бұрын
Does it break if you click extremely quickly or hold the mouse down for an extended period of time before releasing?
@poryg5350
@poryg5350 6 жыл бұрын
A regular user won't care about holding a mouse button for long.
@devikakrishna4464
@devikakrishna4464 4 жыл бұрын
"The problem of being faster than light is that you can only live in darkness" - Google Chrome
@corbintheintern6229
@corbintheintern6229 6 жыл бұрын
I'm blown away. I've been programming for just over a year now and I don't think I'll ever be THIS good.
@christobanistan8887
@christobanistan8887 6 жыл бұрын
Give it 10.
@gabrielbarroso4118
@gabrielbarroso4118 7 жыл бұрын
by the way, the anti debugger script won't work for smarter variations, like: function(){ eval('deb' + 'ugger'); } actually, setInterval itself can evaluate string code, so: setInterval('debugger',1); I don't think this would trigger the function constructor
@eternialogic
@eternialogic 6 жыл бұрын
always glad that people like you are finding all of those popunders so that we are not giving free views and losing bandwidth to some 13 year old playing CS:GO.
@mohamedabdelmonim8111
@mohamedabdelmonim8111 7 жыл бұрын
I like your videos so much and they helped me a lot, Thank you,keep going! Can you have an episode for AFL fuzzer or fuzzing as general idea? that would be great as I couldn't find a good simple explanation.
@Salmiery
@Salmiery 7 жыл бұрын
Great video yet again! Hopefully you are getting kickback from Google for bug bounties!
@tristant9686
@tristant9686 7 жыл бұрын
This is super cool. Please keep making more content.
@angelcaru
@angelcaru 5 жыл бұрын
The basic idea popunder
6 жыл бұрын
5:24 Nice German past tense suffix.
@LiveOverflow
@LiveOverflow 6 жыл бұрын
oops
@cesasol
@cesasol 6 жыл бұрын
As a web developer I'm amazed, you take the time to explain everything
@5aboody5
@5aboody5 6 жыл бұрын
Ur My New Fav Channel I always Learn More From U It Hapen To Me That I Thought That The POPup Have been Close And It Was In the Back Thx Teacher
@seismicdna
@seismicdna 7 жыл бұрын
You could also make a userscript/tamper monkey script that will make this process faster (for prototyping)
@yesthatsam
@yesthatsam 7 жыл бұрын
Brilliant as usual .Thanks!
@LF-ro7nk
@LF-ro7nk 6 жыл бұрын
You are a Genius!
@fadmad7257
@fadmad7257 7 жыл бұрын
Hey man I just wanted to find out if you do any real world vulnerability research, and how much CTFs help with that, e.g finding sandbox escape bugs in chrome or linux kernel vulnerabilities? thanks for your videos.
@jakub.boucek
@jakub.boucek 6 жыл бұрын
I love your stories! :-D
@Daniel15au
@Daniel15au 7 жыл бұрын
Fantastic video! Thank you for posting it.
@nsg650
@nsg650 5 жыл бұрын
first thing the popunder library need to do is disble the demo page which help liveoverflow to know how it works and report it as a bug to chromium bugs
@soopyc
@soopyc 6 жыл бұрын
Yay fixed in version 69 :) EDIT: the pop under is appeared in another tab and returned me to my original page
@sunted5454
@sunted5454 7 жыл бұрын
thank you very much, you deserved a like
@Sypaka
@Sypaka 6 жыл бұрын
This is the reason Javascript needs permissions. Oh, you want to window.open()? nope, it's denied. Adblocker and NoScript only take you so far.
@bulbyvr
@bulbyvr 5 жыл бұрын
Wait is that why a lot of websites ask for notifications?
@Rudxain
@Rudxain 2 жыл бұрын
This reminds me of Death Note and other animes about hackers. This is the most epic battle lol
@ndm13
@ndm13 7 жыл бұрын
You should consider throwing the code into a deobfuscator first. It'd make debugging easier!
@Rhidayah
@Rhidayah 4 жыл бұрын
The founder pop under be like: Ah $hit here we go again
@retrogameplus3838
@retrogameplus3838 7 жыл бұрын
He's gonna piss of the advertising mafia they were totally saving a second exploit which they deployed.
@abdoben833
@abdoben833 4 жыл бұрын
my brain is about to explode
@MoraFermi
@MoraFermi 6 жыл бұрын
Alternative title: When "Fast" is Too Fast.
@WorldReserveCurrency
@WorldReserveCurrency 7 жыл бұрын
great stuff!
@ineedtodrive
@ineedtodrive 7 жыл бұрын
performance tab.damn. got u!
@donovanvanderlinde3478
@donovanvanderlinde3478 4 жыл бұрын
Isn't this really problematic .... My js isn't shabby and i can think of some very bad consequences of this.... If you can write that event listener to the second tab via that window object what stops you from taking anything from the current scope and sharing it via the second page?
@joachim4660
@joachim4660 4 жыл бұрын
Can I download a chrome extension you did?
@DanielLiNeutrinos
@DanielLiNeutrinos 4 жыл бұрын
Pop under is real scummy. Thanks for helping deal with that!
@toyotahiace4515
@toyotahiace4515 6 жыл бұрын
What happens then when you hold down mousebutton?
@christobanistan8887
@christobanistan8887 6 жыл бұрын
Surely the tab wouldn't close till you lifted.
@PipleKlo
@PipleKlo 6 жыл бұрын
This is fucking genius.
@TheSpawacz
@TheSpawacz 6 жыл бұрын
9:22 hah toż to papieżowa liczba
@oldpain7625
@oldpain7625 Жыл бұрын
If something like this exists as a job, what is it?
@TheSpacecraftX
@TheSpacecraftX 6 жыл бұрын
Are they giving you bug bounties on these?
@u_rnext2bvirus929
@u_rnext2bvirus929 4 жыл бұрын
Aren't they still collecting meta data from you , even if your leaving in the back ground?
@vaibhavbhoir6995
@vaibhavbhoir6995 3 жыл бұрын
Why do they use popunders?
@undefinedchannel9916
@undefinedchannel9916 3 жыл бұрын
to get ads in the background, maybe you'll be less likely to notice/close them or something?
@crypto.7562
@crypto.7562 2 жыл бұрын
It doesn't work anymore
@scarlas7071
@scarlas7071 7 жыл бұрын
Why is a script allowed to call document.write on another tab it just opened? Doesn't this make it possible to open any website and write a script to it to steal cookies like in XSS?
@LiveOverflow
@LiveOverflow 7 жыл бұрын
Indeed. You can't do that with any page. But it opened a blank page so the same origin policy is not violated ;)
@scarlas7071
@scarlas7071 7 жыл бұрын
I don't think I fully understand. As I understand it, the same origin policy is means that a script is not allowed to send a get request to a different domain with cookies. When a new tab is opened, I do get an authenticated site, and the document.write function does not perform a get request. Is this a different aspect of the same origin policy that was not explained in web 0x04?
@LiveOverflow
@LiveOverflow 7 жыл бұрын
there is no get request involved. we just open a blank page, no site is loaded on the new tab. And thus we can write to the document of it. If we had opened an actual website, we wouldn't be allowed to write to it.
@scarlas7071
@scarlas7071 7 жыл бұрын
I think I get it now. Writing to a page is apparently subject to the same restrictions as requesting resources. The about:blank page is not considered a website so the same origin policy does not apply to it. Thanks for clarifying.
@john80944
@john80944 6 жыл бұрын
god this is amazing.
@UsatiyNyan
@UsatiyNyan 6 жыл бұрын
The L and the Kira DeathNotebook: Ads
@segfault-berlin
@segfault-berlin 4 жыл бұрын
I use I3, good luck popping under there
@daanbreur
@daanbreur 5 жыл бұрын
LifeOverflow - Reverse Engineering Popunders for Chrome to solve
@zihasz5305
@zihasz5305 3 жыл бұрын
There are obfusctators that rename everything to a combination if l and I so your lucky that this is not like that :)
@山田ちゃん
@山田ちゃん 5 жыл бұрын
Are You working in a VM or do you Forget to install a Video driver? 😁😥
@TechKerala
@TechKerala 7 жыл бұрын
Not working on Stable Chrome Mac :( didn't checked my chrome version. time to sleep.. good night.. Nice video ;) keep going.
@LiveOverflow
@LiveOverflow 7 жыл бұрын
+TechKErala yeah because it affects only Windows ;)
@TechKerala
@TechKerala 7 жыл бұрын
Oh,, i am sorry! I watched it again! you said it works only on windows! I missed that! :)
@tomaschku
@tomaschku 6 жыл бұрын
0:46 "How?" Because Windows is crap in Security?
@LiEnby
@LiEnby 6 жыл бұрын
but this is an issue with chrome not windows ^
@t33th4n
@t33th4n 6 жыл бұрын
Perhaps you should start asking for money not to release videos... Let's say 100k for a week delay?! :D
@ETXAlienRobot201
@ETXAlienRobot201 6 жыл бұрын
extorting extortionists! nice! unfortunately, they could probably sue him or such for that... besides the fact disclosing this so it can be broken more permanently is the better thing to do here.
@itsxxxiang3865
@itsxxxiang3865 4 жыл бұрын
I was new to push notifications couple of months ago... been doing research of best ad networks for push notifications. Tested couple of networks - eventually came across MonadPlug Push Monetization. I can saythat I regret not finding MonadPlug earlier, definitely check it out!
@magicalframe9441
@magicalframe9441 4 жыл бұрын
This is the definition of white hat
@oeb41
@oeb41 4 жыл бұрын
cmon hes just trying to make a living
@wojciechwilimowski985
@wojciechwilimowski985 3 жыл бұрын
Clever girl...
@TheMrMinePlaysHD
@TheMrMinePlaysHD 6 жыл бұрын
oida du bist ein Gott
@unclejoe8310
@unclejoe8310 7 жыл бұрын
Hey lieber LiveOverflow, ähnlich wie du hab ich mich immer für Reverse Engineering interessiert, konkreter: Malware Analysis Kannste mal sowas machen? Gruss
@LiveOverflow
@LiveOverflow 7 жыл бұрын
+alder Goony schau dir malwareanalysishedgehog an ;)
@paulhendrix8599
@paulhendrix8599 7 жыл бұрын
Geil. Danke.
@unclejoe8310
@unclejoe8310 7 жыл бұрын
Danke auch :) Paul auch interessiert :)
@marygraceandong9326
@marygraceandong9326 4 жыл бұрын
MonadPlug is an amazing ad-network for push monetization, just thought I should share it since my revenue increased by 20% after switching from another network.
@raouflezoul2662
@raouflezoul2662 4 жыл бұрын
..
@valen8560
@valen8560 6 жыл бұрын
it is a beautiful abuse of mechanisms
@christobanistan8887
@christobanistan8887 6 жыл бұрын
:)) clever
@thegodreo
@thegodreo 4 жыл бұрын
gi
@inaccessible2720
@inaccessible2720 7 жыл бұрын
Nice
@fatyeet6882
@fatyeet6882 7 жыл бұрын
didn't think I'd see you here
@inaccessible2720
@inaccessible2720 7 жыл бұрын
wowowowow
@Beaches_south_of_L.A.
@Beaches_south_of_L.A. 6 жыл бұрын
Dude you never get to the point plus you have endless tangents. I can't take anymore
@ricardo.mazeto
@ricardo.mazeto 7 жыл бұрын
That's one of the reasons I use terminal based browsers for most of my browsing.
@willrebain
@willrebain 7 жыл бұрын
"I ride a scooter because automobiles can be involved in traffic incidence" Your logic. Flawless.
@ricardo.mazeto
@ricardo.mazeto 7 жыл бұрын
Your counter argument makes little sense, since scooters are more vulnerable to accidents than cars.
@moth.monster
@moth.monster 7 жыл бұрын
How's it like to watch a youtube video through a terminal?
@ricardo.mazeto
@ricardo.mazeto 7 жыл бұрын
Copy the link (tmux supports copy and paste), and run "mpv --vo drm ytdl://kzbin.info/www/bejne/hoHdg5aQgbN2hrs".
@lunafoxfire
@lunafoxfire 6 жыл бұрын
Lol... whatever floats your boat I guess
[Live] Reverse Engineering new PopUnder for Chrome 63 on Windows
4:37:00
Reverse Engineering Obfuscated JavaScript
14:04
LiveOverflow
Рет қаралды 155 М.
Ozoda - Alamlar (Official Video 2023)
6:22
Ozoda Official
Рет қаралды 10 МЛН
How to have fun with a child 🤣 Food wrap frame! #shorts
0:21
BadaBOOM!
Рет қаралды 17 МЛН
Жездуха 42-серия
29:26
Million Show
Рет қаралды 2,6 МЛН
Как Ходили родители в ШКОЛУ!
0:49
Family Box
Рет қаралды 2,3 МЛН
Custom Chromium Build to Reverse Engineer Pop-Under Trick
15:01
LiveOverflow
Рет қаралды 132 М.
Solving a JavaScript crackme: JS SAFE 2.0 (web) - Google CTF 2018
15:01
HOW FRCKN' HARD IS IT TO UNDERSTAND A URL?! - uXSS CVE-2018-6128
15:47
Generic HTML Sanitizer Bypass Investigation
14:05
LiveOverflow
Рет қаралды 142 М.
The Curse of Cross-Origin Stylesheets - Web Security Research
19:58
LiveOverflow
Рет қаралды 101 М.
Authentication Bypass Using Root Array
13:24
LiveOverflow
Рет қаралды 126 М.
Reversing and Cracking first simple Program - bin 0x05
9:03
LiveOverflow
Рет қаралды 508 М.
Ozoda - Alamlar (Official Video 2023)
6:22
Ozoda Official
Рет қаралды 10 МЛН